Skip to content

Commit ef68ba0

Browse files
committed
Learn Editor: Update attack-surface-reduction-rules-deployment-test.md
1 parent 425636b commit ef68ba0

File tree

1 file changed

+36
-4
lines changed

1 file changed

+36
-4
lines changed

defender-endpoint/attack-surface-reduction-rules-deployment-test.md

Lines changed: 36 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ You can use Microsoft Intune Endpoint Security to configure custom attack surfac
8484
8585
Your new attack surface reduction policy for attack surface reduction rules is listed in **Endpoint security | Attack surface reduction**.
8686

87-
> [!div class="mx-imgBorder"]
87+
> [!div class="mx-imgBorder"]
8888
> :::image type="content" source="media/asr-mem-my-asr-rules.png" alt-text=" The Attack surface reduction page" lightbox="media/asr-mem-my-asr-rules.png":::
8989
9090
<a name='step-2-understand-the-asr-rules-reporting-page-in-the-microsoft-365-defender-portal'></a>
@@ -188,10 +188,9 @@ For more information about using the attack surface reduction rules report, see
188188

189189
Attack surface reduction rules now provide the capability to configure rule-specific exclusions, known as "Per Rule Exclusions."
190190

191-
> [!NOTE]
192-
> Per-rule exclusions cannot currently be configured by using PowerShell or Group Policy.
191+
To configure specific rule exclusions, you have the choices of using the MDE Security Settings Management, Intune, and Group Policy.
193192

194-
To configure specific rule exclusions:
193+
#### Via Intune:
195194

196195
1. Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), and navigate to **Home** > **Endpoint security** > **Attack surface reduction**.
197196

@@ -208,6 +207,37 @@ To configure specific rule exclusions:
208207
> [!TIP]
209208
> Use the checkboxes next to your list of exclusion entries to select items to **Delete**, **Sort**, **Import**, or **Export**.
210209
210+
### Via Group Policy
211+
212+
213+
214+
Use Group Policy to set the per-user ASR rule exclusions
215+
216+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
217+
218+
1. Right-click the Group Policy Object you want to configure, and then select **Edit**.
219+
220+
1. In the **Group Policy Management Editor** go to **Computer configuration**.
221+
222+
1. Select **Administrative templates**.
223+
224+
1. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Microsoft Defender Exploit Guard > Attack Surface Reduction**.
225+
226+
1. Double-click **Apply a list of exclusions to specific attack surface reduction (ASR) rules**, and set the option to **Enabled**.
227+
228+
1. Then click on **Show...**
229+
230+
1. Under "**Value Name**", enter "GUID for the ASR Rule" without the double quotes
231+
232+
1. Under "**Value**", enter the <drive_letter:\Path\ProcessName>. In order to add multiple processes, it's separated by a greater than sign (>)
233+
234+
e.g. "C:\Notepad.exe>c:\regedit.exe>C:\SomeFolder\test.exe" without the double quotes
235+
236+
1. select **OK**. This setting allows the processes that are being blocked by the particular ASR Rule to continue running.
237+
238+
> [!NOTE]
239+
> If the policies are not applying, please review [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings)
240+
211241
### Use PowerShell as an alternative method to enable attack surface reduction rules
212242

213243
You can use PowerShell - as an alternative to Intune - to enable attack surface reduction rules in audit mode to view a record of apps that would have been blocked if the feature was fully enabled. You can also get an idea of how often the rules fire during normal use.
@@ -255,4 +285,6 @@ Event ID | Description
255285

256286
[Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
257287

288+
[Troubleshoot attack surface reduction rules](/defender-endpoint/troubleshoot-asr)
289+
258290
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)